2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC) 2011
DOI: 10.1109/siecpc.2011.5876940
|View full text |Cite
|
Sign up to set email alerts
|

New card based scheme to ensure security and trust in vehicular communications

Abstract: Jamalul-lail bin Ab MananAdvanced Information Security Cluster MIMOS Berhad Technology Park Malaysia Kuala Lumpur, Malaysia jamalul.lail@mimos.my Abstract -Potential safety and non safety applications of vehicular network provide solutions to current traffic system. Dynamic topology of the vehicular communication network and high speed of the vehicles make it a challenging task of authenticating the users. Researchers have proposed different types of authentication mechanisms for secure vehicular communication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 15 publications
(7 reference statements)
0
4
0
Order By: Relevance
“…Because of multiple identities of each node, the network suffers from a huge security risk because one vehicle can deceive others by creating a deception of multiple vehicles on the road. Attacker can also send fake messages like non-existing traffic jam message, wrong route directions or even give false positions so the whole network which is risky for the passengers lives [138]. For example, in [139], an attacker creates a large number of pseudonyms, and fools vehicles to think that there is a traffic jam ahead of them and forces them to tell other vehicles that there is jam ahead, then makes them take an alternate route.…”
Section: Availability Attacks and Proposed Solutionsmentioning
confidence: 99%
“…Because of multiple identities of each node, the network suffers from a huge security risk because one vehicle can deceive others by creating a deception of multiple vehicles on the road. Attacker can also send fake messages like non-existing traffic jam message, wrong route directions or even give false positions so the whole network which is risky for the passengers lives [138]. For example, in [139], an attacker creates a large number of pseudonyms, and fools vehicles to think that there is a traffic jam ahead of them and forces them to tell other vehicles that there is jam ahead, then makes them take an alternate route.…”
Section: Availability Attacks and Proposed Solutionsmentioning
confidence: 99%
“…Moreover, in vehicular environment nodes are extremely dynamic, continuously leaving a cluster }and connection a brand new cluster. So a malicious node will be part of a replacement cluster that don't have any plan regarding its dangerous history, and deceive nodes at this new cluster.. Sumra et al [15] depends on a 16 digit code to make sure a secure key renewal. The most disadvantage of this resolution happens at the entry purpose wherever client and service supplier authentication task is performed; the channel might be full once range of users will increase, e.g.…”
Section: Litrature Reviewmentioning
confidence: 99%
“…Recently, some security hardwares have been introduced to VANET, which make it feasible to implement robust cryptographic tools, for instance, tamper‐proof devices that provide the ability of processing, signing and verifying messages, protect hardware from tampering by a set of sensors, event data recorder that records all received data such that, position, speed, acceleration, time etc. .…”
Section: Preliminariesmentioning
confidence: 99%